mirror of
https://github.com/pomerium/pomerium.git
synced 2025-06-03 11:22:45 +02:00
DOCS: keyword tag updates (#2922)
* replace "zero-trust" with "zero trust" * fix and update all keyword tags
This commit is contained in:
parent
3c87751c41
commit
64d50613af
54 changed files with 86 additions and 75 deletions
|
@ -3,10 +3,10 @@ title: AdGuard
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy adguard ad-guard pi-hole piehole
|
||||
content: pomerium, identity access proxy, adguard, ad guard, pi hole, piehole
|
||||
description: >-
|
||||
This guide covers how to add authentication and authorization to a hosted,
|
||||
fully, online instance of adguard.
|
||||
fully, online instance of Adguard.
|
||||
---
|
||||
|
||||
# Securing AdGuard Home
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Argo
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy argo argo-cd
|
||||
content: pomerium, identity access proxy, argo, cd, continuous deployment
|
||||
description: >-
|
||||
This guide covers how to add authentication and authorization to an instance
|
||||
of argo.
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Cloud Run
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy gcp google iap serverless cloudrun
|
||||
content: pomerium, identity access proxy, gcp, google, iap, serverless, cloudrun
|
||||
description: >-
|
||||
This guide covers how to deploy Pomerium to Cloud Run and use it to protect
|
||||
other endpoints via Authorization Headers.
|
||||
|
|
|
@ -4,8 +4,8 @@ lang: en-US
|
|||
meta:
|
||||
- name: keywords
|
||||
content: >-
|
||||
pomerium identity-access-proxy visual-studio-code visual studio code
|
||||
authentication authorization
|
||||
pomerium, identity access proxy, visual studio code,
|
||||
authentication, authorization
|
||||
description: >-
|
||||
This guide covers how to add authentication and authorization to a hosted,
|
||||
fully, online instance of visual studio code.
|
||||
|
|
|
@ -4,8 +4,8 @@ lang: en-US
|
|||
meta:
|
||||
- name: keywords
|
||||
content: >-
|
||||
pomerium identity-access-proxy webauthn device id enroll
|
||||
authentication authorization
|
||||
pomerium, identity access proxy, webauthn, device id, enroll, enrollment,
|
||||
authentication, authorization
|
||||
description: >-
|
||||
This guide covers how to enroll a trusted execution environment device as a Pomerium end-user.
|
||||
---
|
||||
|
|
|
@ -4,8 +4,8 @@ lang: en-US
|
|||
meta:
|
||||
- name: keywords
|
||||
content: >-
|
||||
pomerium identity-access-proxy gitlab gitlab-ee docker
|
||||
authentication authorization
|
||||
pomerium, identity access proxy, gitlab, gitlab-ee, docker,
|
||||
authentication, authorization, self-hosted
|
||||
description: >-
|
||||
This guide covers how to secure self-hosted GitLab behind Pomerium, providing authentication and authorization through your IdP.
|
||||
---
|
||||
|
|
|
@ -4,8 +4,8 @@ lang: en-US
|
|||
meta:
|
||||
- name: keywords
|
||||
content: >-
|
||||
pomerium identity-access-proxy data logging graphing grafana
|
||||
authentication authorization
|
||||
pomerium, identity access proxy, data, logging, graphing, grafana,
|
||||
authentication, authorization
|
||||
description: >-
|
||||
This guide covers how to use Pomerium to authenticate and authorize users of Grafana.
|
||||
---
|
||||
|
|
|
@ -3,7 +3,7 @@ title: JWT Verification
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy envoy jwt
|
||||
content: pomerium, identity access proxy, envoy, jwt,
|
||||
description: >-
|
||||
This example demonstrates how to verify the Pomerium JWT assertion header using Envoy.
|
||||
---
|
||||
|
@ -11,7 +11,7 @@ description: >-
|
|||
# JWT Verification
|
||||
This example demonstrates how to verify the [Pomerium JWT assertion header](https://www.pomerium.io/reference/#pass-identity-headers) using [Envoy](https://www.envoyproxy.io/). This is useful for legacy or 3rd party applications which can't be modified to perform verification themselves.
|
||||
|
||||
This guide is a practical demonstration of some of the topics discussed in [Mutual Authentication: A Component of Zero-Trust].
|
||||
This guide is a practical demonstration of some of the topics discussed in [Mutual Authentication: A Component of Zero Trust].
|
||||
|
||||
## Requirements
|
||||
- [Docker](https://www.docker.com/)
|
||||
|
@ -239,6 +239,6 @@ You should now be able to run the example with:
|
|||
[httpbin.localhost.pomerium.io]: https://verify.localhost.pomerium.io
|
||||
[Local Development with Wildcard DNS on Linux]: https://sixfeetup.com/blog/local-development-with-wildcard-dns-on-linux
|
||||
[Local Development with Wildcard DNS]: https://blog.thesparktree.com/local-development-with-wildcard-dns
|
||||
[Mutual Authentication: A Component of Zero-Trust]: /docs/topics/mutual-auth.md
|
||||
[Mutual Authentication: A Component of Zero Trust]: /docs/topics/mutual-auth.md
|
||||
[Mutual Authentication With a Sidecar]: /docs/topics/mutual-auth.md#mutual-authentication-with-a-sidecar
|
||||
[verify.localhost.pomerium.io]: https://verify.localhost.pomerium.io
|
|
@ -3,7 +3,7 @@ title: Kubernetes Dashboard
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy kubernetes helm k8s oauth dashboard
|
||||
content: pomerium, identity access proxy, kubernetes, helm, k8s, oauth, dashboard,
|
||||
description: >-
|
||||
This guide covers how to add authentication and authorization to kubernetes dashboard using single-sing-on, pomerium, helm, and letsencrypt certificates.
|
||||
---
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Kubernetes API / Kubectl
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy kubernetes helm k8s oauth
|
||||
content: pomerium, identity access proxy, kubernetes, helm, k8s, oauth
|
||||
description: >-
|
||||
This guide covers how to add authentication and authorization to kubernetes apiserver using single-sing-on and pomerium.
|
||||
---
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Local OIDC Provider
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy oidc
|
||||
content: pomerium, identity access proxy, oidc, identity provider, idp
|
||||
description: >-
|
||||
This guide covers how to use Pomerium with a local OIDC provider using [qlik/simple-oidc-provider].
|
||||
---
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Client-Side mTLS
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy mtls client-certificate
|
||||
content: pomerium, identity access proxy, mtls, client certificate, mutual authentication
|
||||
description: >-
|
||||
This guide covers how to use Pomerium to implement mutual authentication
|
||||
(mTLS) for end-users, using client certificates with a custom certificate authority.
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Nginx
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy nginx
|
||||
content: pomerium, identity access proxy, nginx
|
||||
description: >-
|
||||
This guide covers how to use Pomerium to protect services behind an nginx
|
||||
proxy.
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Synology
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy synology docker
|
||||
content: pomerium, identity access proxy, synology, docker, dsm, nas
|
||||
---
|
||||
|
||||
# Synology
|
||||
|
|
|
@ -3,7 +3,7 @@ title: TCP Services
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy ssh tcp postgres database redis mysql
|
||||
content: pomerium, identity access proxy, ssh, tcp, postgres, database, redis, mysql
|
||||
description: >-
|
||||
This guide covers how to use Pomerium to protect TCP services such as SSH, Postgres and Redis.
|
||||
---
|
||||
|
|
|
@ -3,7 +3,7 @@ title: TiddlyWiki
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy wiki tiddlywiki
|
||||
content: pomerium, identity access proxy, wiki, tiddlywiki
|
||||
description: >-
|
||||
This guide covers how to add authentication and authorization to a hosted, fully, online instance of TiddlyWiki.
|
||||
---
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Traefik Ingress
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy traefik kubernetes forwardauth forward-auth external helm k8s ingress
|
||||
content: pomerium, identity access proxy, traefik, kubernetes, forwardauth, forward auth, external, helm, k8s, ingress
|
||||
description: >-
|
||||
This guide covers how to use Pomerium to secure Traefik when used as a Kubernetes Ingress Controller
|
||||
---
|
||||
|
|
|
@ -4,7 +4,7 @@ lang: en-US
|
|||
meta:
|
||||
- name: keywords
|
||||
content: >-
|
||||
pomerium bittorrent torrent pomerium identity-access-proxy transmission-daemon transmission authentication authorization
|
||||
pomerium, bittorrent, torrent, identity access proxy, transmission-daemon, transmission, authentication, authorization
|
||||
description: >-
|
||||
Learn how to use Pomerium as an authentication and authorization proxy for a Transmission torrent daemon.
|
||||
---
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Upstream mTLS
|
|||
lang: en-US
|
||||
meta:
|
||||
- name: keywords
|
||||
content: pomerium identity-access-proxy mtls client-certificate
|
||||
content: pomerium, identity access proxy, mtls, client certificate, mutual authentication
|
||||
description: >-
|
||||
This guide covers how to configure Pomerium to provide mutual authentication
|
||||
(mTLS) to an upstream service, using client certificates with a custom certificate authority.
|
||||
|
@ -11,7 +11,7 @@ description: >-
|
|||
|
||||
# Upstream mTLS With Pomerium
|
||||
|
||||
Part of a complete zero-trust security model is secure communication between your identity-aware access proxy (Pomerium) and the upstream service it provides access to. This means both Pomerium *and* the upstream service will authenticate each other.
|
||||
Part of a complete zero trust security model is secure communication between your identity-aware access proxy (Pomerium) and the upstream service it provides access to. This means both Pomerium *and* the upstream service will authenticate each other.
|
||||
|
||||
Pomerium confirms the identity of an upstream service by the TLS certificate it serves. See [`tls_custom_ca_file`] and [`tls_server_name`] for more information on configuring Pomerium to accept an upstream's TLS certificate.
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue